12 Categories • 376 Tools • 153 Guides

OSINT Categories

Explore comprehensive intelligence gathering categories, from social media analysis to cyber threat intelligence. Each category includes specialized tools, methodologies, and practical applications.

12
Categories
376
Tools
153
Guides
1200+
Techniques
Beginner
Social Media Intelligence (SOCMINT)
Gathering and analyzing intelligence from social media platforms, including user profiling, network analysis, and content monitoring.
45 tools12 guides
Key Tools:
Sherlock
Social-Analyzer
Twint
InstaLoader
Applications:
  • Brand monitoring
  • Threat detection
  • Due diligence
Explore Category
Advanced
Data Mining & Analysis
Extracting, processing, and analyzing large datasets from various sources to uncover patterns, relationships, and actionable intelligence.
38 tools15 guides
Key Tools:
Maltego
Palantir
Splunk
Apache Spark
Applications:
  • Fraud detection
  • Threat hunting
  • Risk assessment
Explore Category
Intermediate
Geospatial Intelligence (GEOINT)
Analyzing geographic information and imagery to understand physical locations, movements, and spatial relationships for intelligence purposes.
32 tools10 guides
Key Tools:
Google Earth Pro
QGIS
ArcGIS
Sentinel Hub
Applications:
  • Asset tracking
  • Route planning
  • Environmental monitoring
Explore Category
Beginner
Search Engine Intelligence
Leveraging search engines and advanced operators to discover hidden information, leaked data, and publicly available intelligence.
28 tools18 guides
Key Tools:
Google Dorks
Shodan
Censys
Wayback Machine
Applications:
  • Vulnerability research
  • Information disclosure
  • Competitive intelligence
Explore Category
Intermediate
Image & Video Intelligence (IMINT)
Extracting and analyzing intelligence from images and videos, including metadata extraction, reverse image search, and content analysis.
25 tools9 guides
Key Tools:
TinEye
Google Lens
ExifTool
InVID
Applications:
  • Verification of imagery
  • Geolocation
  • Identity verification
Explore Category
Advanced
Network Intelligence (NETINT)
Mapping and analyzing network infrastructure, discovering relationships between domains, IPs, and services for security assessment.
42 tools16 guides
Key Tools:
Nmap
Masscan
Amass
Subfinder
Applications:
  • Attack surface mapping
  • Infrastructure assessment
  • Threat hunting
Explore Category
Advanced
Cyber Threat Intelligence (CTI)
Collecting and analyzing information about current and potential cyber threats, including IOCs, TTPs, and threat actor profiling.
35 tools14 guides
Key Tools:
MISP
OpenCTI
ThreatConnect
IntelOwl
Applications:
  • Threat detection
  • Incident response
  • Vulnerability management
Explore Category
Intermediate
Domain & DNS Intelligence
Investigating domain names, DNS records, WHOIS data, and SSL certificates to uncover infrastructure relationships and ownership.
30 tools11 guides
Key Tools:
WhoisXML API
SecurityTrails
crt.sh
DNSDumpster
Applications:
  • Phishing investigation
  • Brand protection
  • Threat attribution
Explore Category
Beginner
Document Intelligence (DOCINT)
Extracting metadata and intelligence from documents, including PDFs, Office files, and other formats to uncover hidden information.
22 tools8 guides
Key Tools:
Metagoofil
FOCA
ExifTool
Bulk Extractor
Applications:
  • Data leakage detection
  • Attribution analysis
  • Forensic investigation
Explore Category
Intermediate
Code Intelligence (CODEINT)
Analyzing source code repositories, finding exposed credentials, and discovering security vulnerabilities in publicly available code.
27 tools13 guides
Key Tools:
TruffleHog
GitLeaks
Searchcode
Grep.app
Applications:
  • Security research
  • Vulnerability disclosure
  • Threat hunting
Explore Category
Beginner
Digital Footprint Analysis
Mapping and analyzing an individual's or organization's complete digital presence across the internet and various platforms.
33 tools10 guides
Key Tools:
Sherlock
Holehe
WhatsMyName
Namechk
Applications:
  • Background checks
  • Reputation management
  • Fraud prevention
Explore Category
Advanced
Wireless & IoT Intelligence
Discovering and analyzing wireless networks, IoT devices, and their vulnerabilities through various reconnaissance techniques.
19 tools7 guides
Key Tools:
Kismet
Wireshark
Aircrack-ng
Shodan IoT Search
Applications:
  • Security assessment
  • Network inventory
  • Vulnerability research
Explore Category

Category Interconnections

Integrated Intelligence Gathering

OSINT categories are highly interconnected. Effective intelligence gathering often requires combining multiple disciplines:

  • SOCMINT + GEOINT: Verify social media claims with geospatial data
  • NETINT + CTI: Map network infrastructure to identify threat actors
  • IMINT + DOCINT: Extract metadata from images and documents for attribution
  • CODEINT + NETINT: Discover exposed credentials and map to infrastructure
OSINT Workflow
1
Define Objectives
Identify what intelligence you need and why
2
Select Categories
Choose relevant OSINT disciplines
3
Collect & Analyze
Use appropriate tools and techniques
4
Correlate & Report
Combine findings into actionable intelligence

Ready to Start Your OSINT Journey?

Explore our comprehensive tools, guides, and resources to master open source intelligence gathering.